Skip to content

Commit

Permalink
dns/dnsdist: update to 1.9.4 (fixes CVE-2024-25581)
Browse files Browse the repository at this point in the history
PR: 278954
Approved by: submitter is maintainer
  • Loading branch information
RvdE authored and neelchauhan committed May 15, 2024
1 parent 519b9d1 commit 9422b76
Show file tree
Hide file tree
Showing 3 changed files with 37 additions and 5 deletions.
2 changes: 1 addition & 1 deletion dns/dnsdist/Makefile
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
PORTNAME= dnsdist
DISTVERSION= 1.9.3
DISTVERSION= 1.9.4
CATEGORIES= dns net
MASTER_SITES= https://downloads.powerdns.com/releases/

Expand Down
6 changes: 3 additions & 3 deletions dns/dnsdist/distinfo
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
TIMESTAMP = 1712317299
SHA256 (dnsdist-1.9.3.tar.bz2) = f05b68806dc6c4d207b1fadb7ec715c3e0d28d893a8b3b92d58297c4ceb56c3f
SIZE (dnsdist-1.9.3.tar.bz2) = 1577027
TIMESTAMP = 1715595818
SHA256 (dnsdist-1.9.4.tar.bz2) = 297d3a3751af4650665c9d3890a1d5a7a0467175f2c8607d0d5980e3fd67ef14
SIZE (dnsdist-1.9.4.tar.bz2) = 1591994
34 changes: 33 additions & 1 deletion security/vuxml/vuln/2024.xml
Original file line number Diff line number Diff line change
@@ -1,4 +1,36 @@
<vuln vid="5afd64ae-122a-11ef-8eed-1c697a616631">
<vuln vid="f2d8342f-1134-11ef-8791-6805ca2fa271">
<topic>dnsdist -- Transfer requests received over DoH can lead to a denial of service</topic>
<affects>
<package>
<name>dnsdist</name>
<range><lt>1.9.4</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>PowerDNS Security Advisory reports:</p>
<blockquote cite="https://dnsdist.org/security-advisories/index.html">
<p>When incoming DNS over HTTPS support is enabled using the nghttp2 provider,
and queries are routed to a tcp-only or DNS over TLS backend, an attacker can
trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR
or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a
Denial of Service. DNS over HTTPS is not enabled by default, and backends are using
plain DNS (Do53) by default.
</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2024-25581</cvename>
<url>https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2024-03.html</url>
</references>
<dates>
<discovery>2024-05-13</discovery>
<entry>2024-05-13</entry>
</dates>
</vuln>

<vuln vid="5afd64ae-122a-11ef-8eed-1c697a616631">
<topic>Intel CPUs -- multiple vulnerabilities</topic>
<affects>
<package>
Expand Down

0 comments on commit 9422b76

Please sign in to comment.